Remove Data Remove Risk Management Remove White Paper
article thumbnail

Mobile Security – A Requirement for National Security (E166)

FedInsider

This week on Feds At the Edge, leaders from the Federal and commercial sectors share vulnerabilities in the devices we bring from home, and the popular apps that put our sensitive data into the wrong hands. We explore websites that are designed to fool the end users into believing they are on a secure platform.

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

The strongest form of identity management is attribute-based, moving beyond one’s role or position to a host of other characteristics, from behavioral to physical to time-sensitive. It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement. Army War College.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Emerging Technology Series: Cybersecurity

FedInsider

For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. Team Cymru specializes in using data-driven intelligence to assist in understanding the real impact of cyber-crime.

article thumbnail

Are you ready to be the manufacturer of the future?

ivalua

The world of manufacturing is quickly evolving, driven by production modernization, materials innovation, big data, and a new type of workforce. Improving sourcing cycle time is critical, as is having the right information in place to navigate around roadblocks and mitigate risk. It’s time to add some data experts to your teams.

article thumbnail

Procurement policy spring cleaning checklist

Federal News Network

And what of the data that is the “fuel” powering AI? How is that data validated and being used to avoid bias? Supply chain risk management and domestic sourcing. How is AI being leveraged to streamline procurement processes and evaluations? How is industry using AI to compete and win government business?

article thumbnail

Bringing Agility to the Modern Security Operations Center (E132)

FedInsider

Robert Roser Chief Information Security Officer Robert “Rob” Roser is a particle physicist and currently serves as Idaho National Laboratory’s (INL) Chief Information Security Officer as well as Director for Cybersecurity and Chief Data Officer. He joined INL four years go.

article thumbnail

Procurement Policy Spring Cleaning Checklist

The Coalition for Government Procurement

And what of the data that is the “fuel” powering AI? How is that data validated and being used to avoid bias? Supply chain risk management and domestic sourcing. How is AI being leveraged to streamline procurement processes and evaluations? How is industry using AI to compete and win government business?